Nomisec Exploits

21,904 exploits tracked across all sources.

Sort: Activity Stars
CVE-2022-37201 NOMISEC HIGH
Jflyfox Jfinal Cms - SQL Injection
JFinal CMS 5.1.0 is vulnerable to SQL Injection.
by AgainstTheLight
CVSS 8.8
CVE-2021-41773 NOMISEC CRITICAL
Apache 2.4.49/2.4.50 Traversal RCE
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
by mightysai1997
CVSS 9.8
CVE-2022-29856 NOMISEC HIGH
Automationanywhere Automation 360 - Hard-coded Credentials
A hardcoded cryptographic key in Automation360 22 allows an attacker to decrypt exported RPA packages.
by Flo451
CVSS 7.5
CVE-2022-40624 NOMISEC CRITICAL
Pfsense Pfblockerng < 2.1.4_27 - OS Command Injection
pfSense pfBlockerNG through 2.1.4_27 allows remote attackers to execute arbitrary OS commands as root via the HTTP Host header, a different vulnerability than CVE-2022-31814.
by dhammon
2 stars
CVSS 9.8
CVE-2022-34918 NOMISEC HIGH
Netfilter nft_set_elem_init Heap Overflow Privilege Escalation
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
by veritas501
219 stars
CVSS 7.8
CVE-2022-29154 NOMISEC HIGH
rsync <3.2.5 - Info Disclosure
An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).
by EgeBalci
9 stars
CVSS 7.4
CVE-2022-20347 NOMISEC HIGH
Android - Privilege Escalation
In onAttach of ConnectedDeviceDashboardFragment.java, there is a possible permission bypass due to a confused deputy. This could lead to remote escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-228450811
by ShaikUsaf
1 stars
CVSS 8.8
CVE-2019-9766 NOMISEC HIGH
Free MP3 CD Ripper 2.6 - Buffer Overflow
Stack-based buffer overflow in Free MP3 CD Ripper 2.6, when converting a file, allows user-assisted remote attackers to execute arbitrary code via a crafted .mp3 file.
by zeronohacker
1 stars
CVSS 7.8
CVE-2022-37703 NOMISEC LOW
Amanda - Path Traversal
In Amanda 3.5.1, an information leak vulnerability was found in the calcsize SUID binary. An attacker can abuse this vulnerability to know if a directory exists or not anywhere in the fs. The binary will use `opendir()` as root directly without checking the path, letting the attacker provide an arbitrary path.
by MaherAzzouzi
3 stars
CVSS 3.3
CVE-2022-35841 NOMISEC HIGH
Windows Enterprise App Management Service - RCE
Windows Enterprise App Management Service Remote Code Execution Vulnerability
by Wack0
3 stars
CVSS 8.8
CVE-2021-43798 NOMISEC HIGH
Grafana Plugin Path Traversal
Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.
by Jroo1053
1 stars
CVSS 7.5
CVE-2022-30190 NOMISEC HIGH
Microsoft Office Word MSDTJS
A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability.
by ErrorNoInternet
23 stars
CVSS 7.8
CVE-2022-34715 NOMISEC CRITICAL
Microsoft Windows Server 2022 - Code Injection
Windows Network File System Remote Code Execution Vulnerability
by Starssgo
5 stars
CVSS 9.8
CVE-2019-0193 NOMISEC HIGH
Apache Solr < 7.7.3 - Code Injection
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.
by freeFV
CVSS 7.2
CVE-2022-27925 NOMISEC HIGH
Zip Path Traversal in Zimbra (mboximport) (CVE-2022-27925)
Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. An authenticated user with administrator rights has the ability to upload arbitrary files to the system, leading to directory traversal.
by akincibor
3 stars
CVSS 7.2
CVE-2022-30075 NOMISEC HIGH
Tp-link Archer Ax50 Firmware < 210730 - Remote Code Execution
In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup file via web interface can lead to remote code execution due to improper validation.
by M4fiaB0y
1 stars
CVSS 8.8
CVE-2020-11022 NOMISEC MEDIUM
jQuery <3.5.0 - XSS
In jQuery starting with 1.12.0 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
by 0xAJ2K
34 stars
CVSS 6.9
CVE-2019-7213 NOMISEC MEDIUM
SmarterTools SmarterMail <16.x-6985 - Path Traversal
SmarterTools SmarterMail 16.x before build 6985 allows directory traversal. An authenticated user could delete arbitrary files or could create files in new folders in arbitrary locations on the mail server. This could lead to command execution on the server for instance by putting files inside the web directories.
by secunnix
1 stars
CVSS 6.5
CVE-2018-14699 NOMISEC CRITICAL
Drobo 5N2 NAS <4.0.5-13.28.96115 - Command Injection
System command injection in the /DroboAccess/enable_user endpoint in Drobo 5N2 NAS version 4.0.5-13.28.96115 allows unauthenticated attackers to execute system commands via the "username" URL parameter.
by RevoCain
1 stars
CVSS 9.8
CVE-2022-36804 NOMISEC HIGH
Atlassian Bitbucket Server/Data Center <7.6.17/<7.17.10/<7.21.4/<8....
Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew.
by JRandomSage
CVSS 8.8
CVE-2021-38163 NOMISEC CRITICAL
SAP NetWeaver (Visual Composer 7.0 RT) - Command Injection
SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an attacker authenticated as a non-administrative user can upload a malicious file over a network and trigger its processing, which is capable of running operating system commands with the privilege of the Java Server process. These commands can be used to read or modify any information on the server or shut the server down making it unavailable.
by core1impact
4 stars
CVSS 9.9
CVE-2016-5734 NOMISEC CRITICAL
phpMyAdmin <4.0.10.16, <4.4.15.7, <4.6.3 - RCE
phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace e (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementation.
by miko550
1 stars
CVSS 9.8
CVE-2022-40317 NOMISEC MEDIUM
Openkm - XSS
OpenKM 6.3.11 allows stored XSS related to the javascript&colon; substring in an A element.
by izdiwho
2 stars
CVSS 5.4
CVE-2022-22629 NOMISEC HIGH
macOS Monterey <12.3 - Buffer Overflow
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iTunes 12.12.3 for Windows, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.
by lck0
CVSS 8.8
CVE-2021-41773 NOMISEC CRITICAL
Apache 2.4.49/2.4.50 Traversal RCE
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
by Ls4ss
21 stars
CVSS 9.8